MalDev and Syscalls and BOFs, Oh My!
Published 2023-01-24Download video
Recommendations
-
39:38 Hacking Serverless Applications:A Treasure Map for Uncharted Waters
-
22:01 AI for Red Team & Malware Development
-
19:44 I Made Malware In Under 20 Minutes
-
40:43 Modern Adversarial Reconnaissance – Long Live the External
-
42:02 Keynote | Hacking the Cloud Like an APT
-
25:44 DEF CON 30 - Tarek Abdelmotaleb, Dr. Bramwell Brizendine - Weaponizing Windows Syscalls
-
11:26 I Hacked & Exposed This Fake Website for Educational Purposes - CTF
-
23:58 How Hackers Exploit Vulnerable Drivers
-
31:29 Malware Development: Processes, Threads, and Handles
-
1:02:01 #HITB2022SIN EDR Evasion Primer For Red Teamers - Jorge Gimenez & Karsten Nohl
-
24:04 How Hackers Write Malware & Evade Antivirus (Nim)
-
1:08:42 Developing for Linux on Windows - Scott Hanselman - NDC Porto 2022
-
1:09:00 Intro to Syscalls for Windows Malware
-
10:19 How to know if your PC is hacked? Suspicious Network Activity 101
-
10:13 The Malware that hacked Linus Tech Tips
-
16:21 strace feels like magic — let’s fix that (with Rust)
-
1:26:08 Mastering Adversary Emulation with Caldera: A Practical Guide
-
19:00 How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
-
1:01:50 #HITB2023AMS D1T2 - Syscalls In Shellcode: Techniques For Malicious Functionality - B. Brizendine
-
57:28 Better Privacy Through Offense: How to Build a Privacy Red Team
Similar videos
-
27:22 (In)direct Syscalls: A Journey From High To Low - Daniel Feichter
-
17:17 How Does Malware Know It's Being Monitored?
-
1:09:46 RedTeam Tricks Exposed - Reversing Engineering Syscalls To Evade Detection
-
1:01:58 Malware's LAST Stand: SELF-DELETION
-
55:50 SEC670: Red Team Ops – Windows Tool Development Preview
-
04:12 POC of detecting Indirect Syscalls
-
38:06 Using Direct Syscalls in Cobalt Strike's Artifact Kit
-
01:12 SysCooking - Indirect Syscall execution via thread hijacking
-
38:14 Fun with Shellcode (Loaders)
-
31:24 Master of Puppets: How to Tamper an EDR?
-
45:21 004 - Empowering Donut with Direct and Indirect Syscalls
-
45:33 Lookin’ for Bugs in All the Wrong Places
-
35:42 A Roadmap to Learning Malware | How to Get Started!
-
06:25 C# payload mastery 00 - course introduction
-
47:50 Tactical MiTM for Attack and Defense